BlogValentine’s Day scams in 2022
Valentine’s Day Scams in 2022: What to watch for and how to stay safe. Romance scams and the elderly, phishing scams, and shopping scams.
February 1, 2022 • 4 min read
BlogValentine’s Day Scams in 2022: What to watch for and how to stay safe. Romance scams and the elderly, phishing scams, and shopping scams.
February 1, 2022 • 4 min read
SecurityAirTag security for Android users. Plus, a big round of Apple updates (with a fix for the WebKit IndexedDB vulnerability).
January 28, 2022 • 6 min read
BlogApple Watch Security and Privacy tips. Includes location privacy on Apple Watch, passcode and auto-erase information, and more.
January 14, 2022 • 4 min read
SecurityDid T-mobile block Private Relay? EU cell carriers ask to block Private Relay. And an Apple update for car and home.
January 13, 2022 • 5 min read
SecurityWhat are NFTs? What about NFTs and security? This article explains what NFTs are and how to keep your NFTs safe.
January 12, 2022 • 7 min read
SecurityApple’s Legacy Contact program: What is a digital legacy? How do you designate a Legacy Contact in iOS or macOS? What will your contact need?
January 6, 2022 • 7 min read
SecurityThe Hacky Holidays Special: The Checklist crew gets together to discuss our favorite Hollywood films about computers and hacking!
December 23, 2021 • 1 min read
SecurityNew iCloud keychain features for 2022: built-in 2FA code generator, Passwords in System Preferences, and more.
December 20, 2021 • 2 min read
SecuritySecureMac’s Apple 2021 year-in-review, with a security and privacy focus of course! Plus, our Apple 2022 outlook and predictions.
December 17, 2021 • 8 min read
SecurityLog4j is an Internet-breaking vulnerability that could affect users for years to come. Apple AirTag stalking help for Android users.
December 16, 2021 • 6 min read
BlogWe all want a safer 2022 in terms of cybersecurity. These 7 steps will help make it happen! Password managers, identity theft, and more!
December 15, 2021 • 8 min read
SecurityInternet of Things (IoT) toys are popular gifts for kids, but so-called “smart” toys are also notorious for their poor security. Here are 7 steps to set up IoT toys for better security and privacy.
December 13, 2021 • 7 min read